On Mark Rober's new satellite video, they use torque rods before reaction wheels to stabilise the satellite's attitude.
Why did they need to wait?

On Mark Rober's new satellite video, they use torque rods before reaction wheels to stabilise the satellite's attitude.
Why did they need to wait?
I have two 2015 Intel Macbooks.
I want to install fresh MacOS on them.
The reinstall option in recovery mode fails on both.
I can't work out how to make a USB boot disk to just update them.
Apple is fucking painful.
How the fuck do you do this?
🆕 blog! “endless.downward.spiral - is this the beginning of the end of What3Words?”
Long-time readers know that I am not a fan of What Three Words. I think it is a closed, proprietary, and user-unfriendly attempt to enclose the commons. I consider that it has some dangerous failure modes.
A year ago, The Financial Times wrote about What3Words'…
đź‘€ Read more: https://shkspr.mobi/blog/2025/02/endless-downward-spiral-is-this-the-beginning-of-the-end-of-what3words/
⸻
#maps #what3words
Long-time readers know that I am not a fan of What Three Words. I think it is a closed, proprietary, and user-unfriendly attempt to enclose the commons. I consider that it has some dangerous failure modes. A year ago, The Financial Times wrote about What3Words' business woes. But it looks like things are about to get a lot worse. As reported by a user on Reddit, Mercedes cars no longer support What3words. I was in touch with What3words customer support and they confirmed me that Mercedes…
🤢 one for @bloor and @cybergibbons
Given that AI can't accurately count the number of R letters in Strawberry - I am skeptical.
Anyone know why Heathrow Airport
has been on easterly operations for the 6 of the last 7 days?
Virtually no wind. I don't recall this happening before.
(although if someone can see a history of direction of operation that would be interesting)
TIL Mercedes Benz deleted what3words functionality from all their cars.
This would be the same Mercedes Benz who ***invested*** in w3w.
And why did they disable the functionality? Didn’t wanna renew the licence.
Whichever way you read it it’s a shit show.
If you hacked the firmware of an electric toothbrush to increase the amount of time each 30 second phase took by 0.5s each time the toothbrush was used, how long do you think it would be before someone noticed?
Every 2 months, you'd spend another 2 minutes brushing your teeth.
At the end of the year, you'd be spending 14 minutes brushing your teeth.
Would you notice? Would you slowly go mad.
I'm going to try posting my photography on Bluesky for a bit - it seems that there are a lot of photgraphers on there.
Are ships today more vulnerable to cyber attacks due to increased connectivity to their systems?
🚢 In our latest blog post, Andrew Tierney explains the potential risks associated with systems such as the Power Management System (PMS)⚡ and Integrated Alarm and Monitoring System (IAMCS), which are responsible for controlling the power generation and other machinery onboard.
⚠️ The consequences if these are hacked? Blackouts, increased crew workload, and potential loss of control during manoeuvres - especially risky in busy waterways. While hackers taking full remote control of a vessel is unlikely, disruptions to these systems are a genuine concern due to rising automation and inadequate network segmentation.
🛳️ Dynamic positioning vessels and cruise ships have even more complex, integrated systems. Inadequate network isolation among systems like dynamic positioning, safety management systems, and voyage data recorders can allow a hacker to impact multiple systems at once, making recovery far more challenging.
👉 Find out Andrew Tierney's full thoughts and breakdown on how cyber attacks could disrupt modern ship operations in our latest blog: https://www.pentestpartners.com/security-blog/cyber-threats-to-shipping-explained/
#MaritimeCybersecurity #PMS #IAMCS #NetworkSegmentation #OperationalRisk #CyberAwareness #CyberSecurity #ShipCyberSecurity #MaritimeSecurity
TL;DR Modern vessels are becoming increasingly connected. While it is unlikely that hackers could fully control a container ship remotely, they may be able to disrupt systems such as the Power Management System (PMS), leading to blackouts and associated loss of propulsion and steering. Although manual recovery is possible, it can be time-consuming and challenging,
Secure boot ensures only authentic firmware can run on a device and should form part of a layered defence strategy.
But is it enough to only have a secure boot on your main processor?
What about sub-systems without secure boot capabilities? 🤔
If you're trying to figure out how to balance security and practicality in embedded systems, read on:https://www.pentestpartners.com/security-blog/is-secure-boot-on-the-main-application-processor-enough/
TL;DR Secure boot ensures only authentic firmware can run on a device and should form part of a layered defence strategy. Sub-systems often lack secure boot capabilities, limiting protection for non-critical processors. Focus on secure boot for the main processor; it can provide adequate security in many cases. Use safety case methodologies to justify exceptions for lower-risk processors.